Skip to main content

Advertisement

Log in

Medical Image Tamper Detection Based on Passive Image Authentication

  • Published:
Journal of Digital Imaging Aims and scope Submit manuscript

Abstract

Telemedicine has gained popularity in recent years. Medical images can be transferred over the Internet to enable the telediagnosis between medical staffs and to make the patient’s history accessible to medical staff from anywhere. Therefore, integrity protection of the medical image is a serious concern due to the broadcast nature of the Internet. Some watermarking techniques are proposed to control the integrity of medical images. However, they require embedding of extra information (watermark) into image before transmission. It decreases visual quality of the medical image and can cause false diagnosis. The proposed method uses passive image authentication mechanism to detect the tampered regions on medical images. Structural texture information is obtained from the medical image by using local binary pattern rotation invariant (LBPROT) to make the keypoint extraction techniques more successful. Keypoints on the texture image are obtained with scale invariant feature transform (SIFT). Tampered regions are detected by the method by matching the keypoints. The method improves the keypoint-based passive image authentication mechanism (they do not detect tampering when the smooth region is used for covering an object) by using LBPROT before keypoint extraction because smooth regions also have texture information. Experimental results show that the method detects tampered regions on the medical images even if the forged image has undergone some attacks (Gaussian blurring/additive white Gaussian noise) or the forged regions are scaled/rotated before pasting.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Das S, Kundu MK: Effective management of medical information through ROI-lossless fragile image watermarking technique. Computer Methods and Programs in Biomedicine 111(3):662–75, 2013

  2. Nyeem H, Boles W, Boyd C: A review of medical image watermarking requirements for teleradiology. J Digit Imaging 26(2):326–43, 2013

    Article  PubMed  Google Scholar 

  3. Arsalan M, Malik SA, Khan A: Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw. 85(4):883–94, 2012

    Article  Google Scholar 

  4. Fridrich AJ, Soukal BD, and Lukáš AJ: Detection of copy-move forgery in digital images. Proceedings of Digital Forensic Research Workshop 3(2):652–63, 2003

  5. Zain JM, Fauzi AM: Medical image watermarking with tamper detection and recovery. Engineering in Medicine and Biology Society, 2006. EMBS'06. 28th Annual International Conference of the IEEE 1:3270–3, 2006

  6. Wu JHK, Chang RF, Chen CJ, Wang CL, Kuo TH, Moon WK, et al: Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59–76, 2008

    Article  PubMed  Google Scholar 

  7. Chiang K-H, Chang-Chien K-C, Chang R-F, Yen H-Y: Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J. Digit. Imaging. p. 77–90, 2008

  8. Al-Qershi OM, Khoo BE: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. Journal of Digital Imaging 24(1):114–25, 2011

  9. Al-Qershi OM, Khoo BE: ROI-based tamper detection and recovery for medical images using reversible watermarking technique. 2010 I.E. Int Conf Inf Theory Inf Secur 151–5, 2010

  10. Liew SC, Zain JM: Reversible medical image watermarking for tamper detection and recovery. Proc - 2010 3rd IEEE Int Conf Comput Sci Inf Technol ICCSIT 2010. p. 417–20, 2010

  11. Memon NA, Chaudhry A, Ahmad M, Keerio ZA. Hybrid watermarking of medical images for ROI authentication and recovery. International Journal of Computer Mathematics. 2011; 88(10):2057–71.

  12. Tan CK, Ng JC, Xu X, Poh CL, Guan YL, Sheah K: Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging. 24(3):528–40, 2011

    Article  PubMed  Google Scholar 

  13. Tjokorda Agung BW, Adiwijaya Permana FP: Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression. Proceeding - COMNETSAT 2012 2012 I.E. Int Conf Commun Networks Satell. p. 167–71, 2012

  14. Deng X, Chen Z, Zeng F, Zhang Y, Mao Y. Authentication and recovery of medical diagnostic image using dual reversible digital watermarking. Journal of nanoscience and nanotechnology. 13(3), 2099–107, 2013.

  15. Eswaraiah R, Sreenivasa Reddy E: Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl. Hindawi Publishing Corporation; 2014; 2014:1–10. Available from: http://www.hindawi.com/journals/ijta/2014/984646/

  16. Ojala T, Pietikäinen M, Mäenpää T: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell. 24(7):971–87, 2002

    Article  Google Scholar 

  17. Lowe G: SIFT, the scale invariant feature transform. Int J. Of Computer Vision, 60(2), 91–110, 2004

    Article  Google Scholar 

  18. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur. 6(3 PART 2):1099–110, 2011

    Article  Google Scholar 

  19. Bay H, Tuytelaars T, Van Gool L SURF: speeded up robust features. Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics). p. 404–17, 2006

  20. Barre S 1999 Available at: http://www.barre.nom.fr/medical/samples/.

  21. Ulutas M, Ulutas G, Nabiyev VV: Medical image security and EPR hiding using Shamir’s secret sharing scheme, Journal of Systems and Software, 84, 3, 341–353, doi:10.1016/j.jss.2010.11.928, ISSN 0164-1212, 2011

    Article  Google Scholar 

  22. Thabit R, Khoo BE: Medical image authentication using SLT and IWT schemes. Multimed Tools App 1–24,2015. Available from: doi:10.1007/s11042–015-3055-x

  23. Eswaraiah R and Sreenivasa Reddy E: Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest, IET Image Processing, 9, 8, pp. 615–625, 2015

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guzin Ulutas.

Ethics declarations

Competing Interests

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ulutas, G., Ustubioglu, A., Ustubioglu, B. et al. Medical Image Tamper Detection Based on Passive Image Authentication. J Digit Imaging 30, 695–709 (2017). https://doi.org/10.1007/s10278-017-9961-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10278-017-9961-x

Keywords

Navigation